-
Aharonov-Bohm Effect in Generalized Electrodynamics
Authors:
C. A. M. de Melo,
B. M. Perez,
J. C. Sumire Esquia,
R. R. Cuzinatto
Abstract:
The Aharonov-Bohm (AB) effect is considered in the context of Generalized Electrodynamics (GE) by Podolsky and Bopp. GE is the only extension to Maxwell electrodynamics that is locally {\normalsize{}U(1)}-gauge invariant, admits linear field equations and contains higher-order derivatives of the vector potential. GE admits both massless and massive modes for the photon. We recover the ordinary qua…
▽ More
The Aharonov-Bohm (AB) effect is considered in the context of Generalized Electrodynamics (GE) by Podolsky and Bopp. GE is the only extension to Maxwell electrodynamics that is locally {\normalsize{}U(1)}-gauge invariant, admits linear field equations and contains higher-order derivatives of the vector potential. GE admits both massless and massive modes for the photon. We recover the ordinary quantum phase shift of the AB effect, derived in the context of Maxwell electrodynamics, for the massless mode of the photon in GE. The massive mode induces a correction factor to the AB phase shift depending on the photon mass. We study both the magnetic AB effect and its electric counterpart. In principle, accurate experimental observations of AB the phase shift could be used to constrain GE photon mass.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
A Dust-Trap** Ring in the Planet-Hosting Disk of Elias 2-24
Authors:
Adolfo S. Carvalho,
Laura M. Perez,
Anibal Sierra,
Maria Jesus Mellado,
Lynne A. Hillenbrand,
Sean Andrews,
Myriam Benisty,
Tilman Birnstiel,
John M. Carpenter,
Viviana V. Guzman,
Jane Huang,
Andrea Isella,
Nicolas Kurtovic,
Luca Ricci,
David J. Wilner
Abstract:
Rings and gaps are among the most widely observed forms of substructure in protoplanetary disks. A gap-ring pair may be formed when a planet carves a gap in the disk, which produces a local pressure maximum following the gap that traps inwardly drifting dust grains and appears as a bright ring due to the enhanced dust density. A dust-trap** ring would provide a promising environment for solid gr…
▽ More
Rings and gaps are among the most widely observed forms of substructure in protoplanetary disks. A gap-ring pair may be formed when a planet carves a gap in the disk, which produces a local pressure maximum following the gap that traps inwardly drifting dust grains and appears as a bright ring due to the enhanced dust density. A dust-trap** ring would provide a promising environment for solid growth and possibly planetesimal production via the streaming instability. We present evidence of dust trap** in the bright ring of the planet-hosting disk Elias 2-24, from the analysis of 1.3 mm and 3 mm ALMA observations at high spatial resolution (0.029 arcsec, 4.0 au). We leverage the high spatial resolution to demonstrate that larger grains are more efficiently trapped and place constraints on the local turbulence ($8 \times 10^{-4} < α_\mathrm{turb} < 0.03$) and the gas-to-dust ratio ($Σ_g / Σ_d < 30$) in the ring. Using a scattering-included marginal probability analysis we measure a total dust disk mass of $M_\mathrm{dust} = 13.8^{+0.7}_{-0.5} \times 10^{-4} \ M_\odot$. We also show that at the orbital radius of the proposed perturber, the gap is cleared of material down to a flux contrast of 10$^{-3}$ of the peak flux in the disk.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Non-perturbative determination of the ${\cal N} = 1$ SUSY Yang-Mills gluino condensate at large $N$
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Pérez,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We present the first non-perturbative large-$N$ calculation of the $\mathcal{N}=1$ supersymmetric (SUSY) $\mathrm{SU}(N)$ Yang-Mills gluino condensate, obtained by means of numerical simulations of the lattice-discretized theory, and exploiting large-$N$ twisted volume reduction. We present two different determinations based, respectively, on the Banks-Casher formula and on the Gell-Mann-Oakes-Ren…
▽ More
We present the first non-perturbative large-$N$ calculation of the $\mathcal{N}=1$ supersymmetric (SUSY) $\mathrm{SU}(N)$ Yang-Mills gluino condensate, obtained by means of numerical simulations of the lattice-discretized theory, and exploiting large-$N$ twisted volume reduction. We present two different determinations based, respectively, on the Banks-Casher formula and on the Gell-Mann-Oakes-Renner relation, both giving perfectly consistent results. By matching the lattice and the Novikov-Shifman-Vainshtein-Zakharov (NSVZ) regularization schemes, we are able for the first time to compare numerical and analytic computations. Our most accurate determination gives $Σ_{\rm RGI} /Λ_{\rm NSVZ}^3 = 1.55(57)$, in very good agreement with the $N$-dependence and the value predicted by the weak coupling instanton-based approach $Σ_{\rm RGI} /Λ_{\rm NSVZ}^3 = 1$.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Around subgroups of Artin groups: derived subgroups and acylindrical hyperbolicity in the even FC-case
Authors:
Jone Lopez de Gamiz Zearra,
Conchita Martínez Pérez
Abstract:
We generalize to (certain) Artin groups some results previously known for right-angled Artin groups (RAAGs). First, we generalize a result by Droms, B. Servatius, and H. Servatius, and prove that the derived subgroup of an Artin group is free if and only if the group is coherent. Second, coherent Artin groups over non complete graphs split as free amalgamated products along free abelian subgroups,…
▽ More
We generalize to (certain) Artin groups some results previously known for right-angled Artin groups (RAAGs). First, we generalize a result by Droms, B. Servatius, and H. Servatius, and prove that the derived subgroup of an Artin group is free if and only if the group is coherent. Second, coherent Artin groups over non complete graphs split as free amalgamated products along free abelian subgroups, and we extend to arbitrary Artin groups admitting such a splitting a recent result by Casals-Ruiz and the first author on finitely generated normal subgroups of RAAGs. Finally, we use splittings of even Artin groups of FC-type to generalize results of Minasyan and Osin on acylindrical hyperbolicity of their subgroups.
△ Less
Submitted 1 June, 2024; v1 submitted 26 May, 2024;
originally announced May 2024.
-
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the lite…
▽ More
In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the literature. However, current ML/DL vulnerability detection methods struggle with understanding the context and intent behind complex attacks. Integrating large language models (LLMs) with system call analysis offers a promising approach to enhance malware detection. This work presents a novel framework leveraging LLMs to classify malware based on system call data. The framework uses transfer learning to adapt pre-trained LLMs for malware detection. By retraining LLMs on a dataset of benign and malicious system calls, the models are refined to detect signs of malware activity. Experiments with a dataset of over 1TB of system calls demonstrate that models with larger context sizes, such as BigBird and Longformer, achieve superior accuracy and F1-Score of approximately 0.86. The results highlight the importance of context size in improving detection rates and underscore the trade-offs between computational complexity and performance. This approach shows significant potential for real-time detection in high-stakes environments, offering a robust solution to evolving cyber threats.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Mineral Detection of Neutrinos and Dark Matter 2024. Proceedings
Authors:
Sebastian Baum,
Patrick Huber,
Patrick Stengel,
Natsue Abe,
Daniel G. Ang,
Lorenzo Apollonio,
Gabriela R. Araujo,
Levente Balogh,
Pranshu Bhaumik Yilda Boukhtouchen,
Joseph Bramante,
Lorenzo Caccianiga,
Andrew Calabrese-Day,
Qing Chang,
Juan I. Collar,
Reza Ebadi,
Alexey Elykov,
Katherine Freese,
Audrey Fung,
Claudio Galelli,
Arianna E. Gleason,
Mariano Guerrero Perez,
Janina Hakenmüller,
Takeshi Hanyu,
Noriko Hasebe,
Shigenobu Hirose
, et al. (35 additional authors not shown)
Abstract:
The second "Mineral Detection of Neutrinos and Dark Matter" (MDvDM'24) meeting was held January 8-11, 2024 in Arlington, VA, USA, hosted by Virginia Tech's Center for Neutrino Physics. This document collects contributions from this workshop, providing an overview of activities in the field. MDvDM'24 was the second topical workshop dedicated to the emerging field of mineral detection of neutrinos a…
▽ More
The second "Mineral Detection of Neutrinos and Dark Matter" (MDvDM'24) meeting was held January 8-11, 2024 in Arlington, VA, USA, hosted by Virginia Tech's Center for Neutrino Physics. This document collects contributions from this workshop, providing an overview of activities in the field. MDvDM'24 was the second topical workshop dedicated to the emerging field of mineral detection of neutrinos and dark matter, following a meeting hosted by IFPU in Trieste, Italy in October 2022. Mineral detectors have been proposed for a wide variety of applications, including searching for dark matter, measuring various fluxes of astrophysical neutrinos over gigayear timescales, monitoring nuclear reactors, and nuclear disarmament protocols; both as paleo-detectors using natural minerals that could have recorded the traces of nuclear recoils for timescales as long as a billion years and as detectors recording nuclear recoil events on laboratory timescales using natural or artificial minerals. Contributions to this proceedings discuss the vast physics potential, the progress in experimental studies, and the numerous challenges lying ahead on the path towards mineral detection. These include a better understanding of the formation and annealing of recoil defects in crystals; identifying the best classes of minerals and, for paleo-detectors, understanding their geology; modeling and control of the relevant backgrounds; develo**, combining, and scaling up imaging and data analysis techniques; and many others. During the last years, MDvDM has grown rapidly and gained attention. Small-scale experimental efforts focused on establishing various microscopic readout techniques are underway at institutions in North America, Europe and Asia. We are looking ahead to an exciting future full of challenges to overcome, surprises to be encountered, and discoveries lying ahead of us.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Advanced simulation-based predictive modelling for solar irradiance sensor farms
Authors:
José L. Risco-Martín,
Ignacio-Iker Prado-Rujas,
Javier Campoy,
María S. Pérez,
Katzalin Olcoz
Abstract:
As solar power continues to grow and replace traditional energy sources, the need for reliable forecasting models becomes increasingly important to ensure the stability and efficiency of the grid. However, the management of these models still needs to be improved, and new tools and technologies are required to handle the deployment and control of solar facilities. This work introduces a novel fram…
▽ More
As solar power continues to grow and replace traditional energy sources, the need for reliable forecasting models becomes increasingly important to ensure the stability and efficiency of the grid. However, the management of these models still needs to be improved, and new tools and technologies are required to handle the deployment and control of solar facilities. This work introduces a novel framework named Cloud-based Analysis and Integration for Data Efficiency (CAIDE), designed for real-time monitoring, management, and forecasting of solar irradiance sensor farms. CAIDE is designed to manage multiple sensor farms simultaneously while improving predictive models in real-time using well-grounded Modeling and Simulation (M&S) methodologies. The framework leverages Model Based Systems Engineering (MBSE) and an Internet of Things (IoT) infrastructure to support the deployment and analysis of solar plants in dynamic environments. The system can adapt and re-train the model when given incorrect results, ensuring that forecasts remain accurate and up-to-date. Furthermore, CAIDE can be executed in sequential, parallel, and distributed architectures, assuring scalability. The effectiveness of CAIDE is demonstrated in a complex scenario composed of several solar irradiance sensor farms connected to a centralized management system. Our results show that CAIDE is scalable and effective in managing and forecasting solar power production while improving the accuracy of predictive models in real time. The framework has important implications for the deployment of solar plants and the future of renewable energy sources.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Maximal weak Orlicz types and the strong maximal on von Neumann algebras
Authors:
Adrián M. González Pérez,
Javier Parcet,
Jorge Pérez García
Abstract:
Let $\mathbf{E}_n: \mathcal{M} \to \mathcal{M}_n$ and $\mathbf{E}_m: \mathcal{N} \to \mathcal{N}_m$ be two sequences of conditional expectations on finite von Neumann algebras. The optimal weak Orlicz type of the associated strong maximal operator $\mathcal{E} = (\mathbf{E}_n\otimes \mathbf{E}_m)_{n,m}$ is not yet known. In a recent work of Jose Conde and the two first-named authors, it was show t…
▽ More
Let $\mathbf{E}_n: \mathcal{M} \to \mathcal{M}_n$ and $\mathbf{E}_m: \mathcal{N} \to \mathcal{N}_m$ be two sequences of conditional expectations on finite von Neumann algebras. The optimal weak Orlicz type of the associated strong maximal operator $\mathcal{E} = (\mathbf{E}_n\otimes \mathbf{E}_m)_{n,m}$ is not yet known. In a recent work of Jose Conde and the two first-named authors, it was show that $\mathcal{E}$ has weak type $(Φ, Φ)$ for a family of functions including $Φ(t) = t \, \log^{2+\varepsilon} t$, for every $\varepsilon > 0$. In this article, we prove that the weak Orlicz type of $\mathcal{E}$ cannot be lowered below $L \log^2 L$, meaning that if $\mathcal{E}$ is of weak type $(Φ, Φ)$, then $Φ(s) \not\in o(s \, \log^2 s)$. Our proof is based on interpolation. Namely, we use recent techniques of Cadilhac/Ricard to formulate a Marcinkiewicz type theorem for maximal weak Orlicz types. Then, we show that a weak Orlicz type lower than $L \log^2 L$ would imply a $p$-operator constant for $\mathcal{E}$ smaller than the known optimum as $p \to 1^{+}$.
△ Less
Submitted 22 April, 2024; v1 submitted 18 April, 2024;
originally announced April 2024.
-
Superior Polymeric Gas Separation Membrane Designed by Explainable Graph Machine Learning
Authors:
Jiaxin Xu,
Agboola Suleiman,
Gang Liu,
Michael Perez,
Renzheng Zhang,
Meng Jiang,
Ruilan Guo,
Tengfei Luo
Abstract:
Gas separation using polymer membranes promises to dramatically drive down the energy, carbon, and water intensity of traditional thermally driven separation, but develo** the membrane materials is challenging. Here, we demonstrate a novel graph machine learning (ML) strategy to guide the experimental discovery of synthesizable polymer membranes with performances simultaneously exceeding the emp…
▽ More
Gas separation using polymer membranes promises to dramatically drive down the energy, carbon, and water intensity of traditional thermally driven separation, but develo** the membrane materials is challenging. Here, we demonstrate a novel graph machine learning (ML) strategy to guide the experimental discovery of synthesizable polymer membranes with performances simultaneously exceeding the empirical upper bounds in multiple industrially important gas separation tasks. Two predicted candidates are synthesized and experimentally validated to perform beyond the upper bounds for multiple gas pairs (O2/N2, H2/CH4, and H2/N2). Notably, the O2/N2 separation selectivity is 1.6-6.7 times higher than existing polymer membranes. The molecular origin of the high performance is revealed by combining the inherent interpretability of our ML model, experimental characterization, and molecule-level simulation. Our study presents a unique explainable ML-experiment combination to tackle challenging energy material design problems in general, and the discovered polymers are beneficial for industrial gas separation.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Insight Gained from Migrating a Machine Learning Model to Intelligence Processing Units
Authors:
Hieu Le,
Zhenhua He,
Mai Le,
Dhruva K. Chakravorty,
Lisa M. Perez,
Akhil Chilumuru,
Yan Yao,
Jiefu Chen
Abstract:
The discoveries in this paper show that Intelligence Processing Units (IPUs) offer a viable accelerator alternative to GPUs for machine learning (ML) applications within the fields of materials science and battery research. We investigate the process of migrating a model from GPU to IPU and explore several optimization techniques, including pipelining and gradient accumulation, aimed at enhancing…
▽ More
The discoveries in this paper show that Intelligence Processing Units (IPUs) offer a viable accelerator alternative to GPUs for machine learning (ML) applications within the fields of materials science and battery research. We investigate the process of migrating a model from GPU to IPU and explore several optimization techniques, including pipelining and gradient accumulation, aimed at enhancing the performance of IPU-based models. Furthermore, we have effectively migrated a specialized model to the IPU platform. This model is employed for predicting effective conductivity, a parameter crucial in ion transport processes, which govern the performance of multiple charge and discharge cycles of batteries. The model utilizes a Convolutional Neural Network (CNN) architecture to perform prediction tasks for effective conductivity. The performance of this model on the IPU is found to be comparable to its execution on GPUs. We also analyze the utilization and performance of Graphcore's Bow IPU. Through benchmark tests, we observe significantly improved performance with the Bow IPU when compared to its predecessor, the Colossus IPU.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Does Differentially Private Synthetic Data Lead to Synthetic Discoveries?
Authors:
Ileana Montoya Perez,
Parisa Movahedi,
Valtteri Nieminen,
Antti Airola,
Tapio Pahikkala
Abstract:
Background: Synthetic data has been proposed as a solution for sharing anonymized versions of sensitive biomedical datasets. Ideally, synthetic data should preserve the structure and statistical properties of the original data, while protecting the privacy of the individual subjects. Differential privacy (DP) is currently considered the gold standard approach for balancing this trade-off.
Object…
▽ More
Background: Synthetic data has been proposed as a solution for sharing anonymized versions of sensitive biomedical datasets. Ideally, synthetic data should preserve the structure and statistical properties of the original data, while protecting the privacy of the individual subjects. Differential privacy (DP) is currently considered the gold standard approach for balancing this trade-off.
Objectives: The aim of this study is to evaluate the Mann-Whitney U test on DP-synthetic biomedical data in terms of Type I and Type II errors, in order to establish whether statistical hypothesis testing performed on privacy preserving synthetic data is likely to lead to loss of test's validity or decreased power.
Methods: We evaluate the Mann-Whitney U test on DP-synthetic data generated from real-world data, including a prostate cancer dataset (n=500) and a cardiovascular dataset (n=70 000), as well as on data drawn from two Gaussian distributions. Five different DP-synthetic data generation methods are evaluated, including two basic DP histogram release methods and MWEM, Private-PGM, and DP GAN algorithms.
Conclusion: Most of the tested DP-synthetic data generation methods showed inflated Type I error, especially at privacy budget levels of $ε\leq 1$. This result calls for caution when releasing and analyzing DP-synthetic data: low p-values may be obtained in statistical tests simply as a byproduct of the noise added to protect privacy. A DP smoothed histogram-based synthetic data generation method was shown to produce valid Type I error for all privacy levels tested but required a large original dataset size and a modest privacy budget ($ε\geq 5$) in order to have reasonable Type II error levels.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
The $\mathrm{SU}(3)$ twisted gradient flow strong coupling without topology freezing
Authors:
Claudio Bonanno,
Jorge Luis Dasilva Golán,
Massimo D'Elia,
Margarita García Pérez,
Andrea Giorgieri
Abstract:
We investigate the role of topology in the lattice determination of the renormalized strong coupling via the gradient flow. This is done adopting the Parallel Tempering on Boundary Conditions to deal with the infamous topological freezing problem that affects standard local updating algorithms. We show that, even in the presence of severe topological freezing, both algorithms yield the same strong…
▽ More
We investigate the role of topology in the lattice determination of the renormalized strong coupling via the gradient flow. This is done adopting the Parallel Tempering on Boundary Conditions to deal with the infamous topological freezing problem that affects standard local updating algorithms. We show that, even in the presence of severe topological freezing, both algorithms yield the same strong coupling once projected onto a fixed topological sector. Moreover, we show that using a non-projected definition of the coupling leads to the same step-scaling sequence. This means that projecting the coupling onto a fixed topological sector does not affect the determination of the dynamically-generated scale of the theory $Λ$.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Corrigendum to "$m$-Periodic Gorenstein objects" [J. Algebra 621 (2023)]
Authors:
Mindy Y. Huerta,
Octavio Mendoza,
M. A. Pérez
Abstract:
Let $(\mathcal{A,B})$ be a GP-admissible pair and $(\mathcal{Z,W})$ be a GI-admissible pair of classes of objects in an abelian category $\mathcal{C}$, and consider the class $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ of $1$-periodic $(ω,\mathcal{B})$-Gorenstein projective objects, where $ω:= \mathcal{A} \cap \mathcal{B}$ and $ν:= \mathcal{Z} \cap \mathcal{W}$. We claimed in \cite[Lem. 8.1]{HMP2023m} tha…
▽ More
Let $(\mathcal{A,B})$ be a GP-admissible pair and $(\mathcal{Z,W})$ be a GI-admissible pair of classes of objects in an abelian category $\mathcal{C}$, and consider the class $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ of $1$-periodic $(ω,\mathcal{B})$-Gorenstein projective objects, where $ω:= \mathcal{A} \cap \mathcal{B}$ and $ν:= \mathcal{Z} \cap \mathcal{W}$. We claimed in \cite[Lem. 8.1]{HMP2023m} that the $(\mathcal{Z,W})$-Gorenstein injective dimension of $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ is bounded by the $(\mathcal{Z,W})$-Gorenstein injective dimension of $ω$, provided that: (1) $ω$ is closed under direct summands, (2) $\mathrm{Ext}^1(π\mathcal{GP}_{(ω,\mathcal{B},1)},ν) = 0$, and (3) every object in $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ admits a $\mathrm{Hom}(-,ν)$-acyclic $ν$-coresolution. These conditions are their duals are part of what we called ``Setup 1''. Moreover, if we replace $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ by the class $\mathcal{GP}_{(\mathcal{A,B})}$ of $(\mathcal{A,B})$-Gorenstein projective objects, the resulting inequality is claimed to be true under a set of conditions named ``Setup 2''.
The proof we gave for the claims $\mathrm{Gid}_{(\mathcal{Z,W})}(π\mathcal{GP}_{(ω,\mathcal{B},1)}) \leq \mathrm{Gid}_{(\mathcal{Z,W})}(ω)$ and $\mathrm{Gid}_{(\mathcal{Z,W})}(\mathcal{GP}_{(\mathcal{A,B})}) \leq \mathrm{Gid}_{(\mathcal{Z,W})}(ω)$ is incorrect, and the purpose of this note is to exhibit a corrected proof of the first inequality, under the additional assumption that every object in $π\mathcal{GP}_{(ω,\mathcal{B},1)}$ has finite injective dimension relative to $\mathcal{Z}$. Setup 2 is no longer required, and as a result the second inequality was removed. We also fix those results in §\ 8 of \cite{HMP2023m} affected by Lemma 8.1, and comment some applications and examples.
△ Less
Submitted 13 January, 2024;
originally announced March 2024.
-
A Flexible Cell Classification for ML Projects in Jupyter Notebooks
Authors:
Miguel Perez,
Selin Aydin,
Horst Lichter
Abstract:
Jupyter Notebook is an interactive development environment commonly used for rapid experimentation of machine learning (ML) solutions. Describing the ML activities performed along code cells improves the readability and understanding of Notebooks. Manual annotation of code cells is time-consuming and error-prone. Therefore, tools have been developed that classify the cells of a notebook concerning…
▽ More
Jupyter Notebook is an interactive development environment commonly used for rapid experimentation of machine learning (ML) solutions. Describing the ML activities performed along code cells improves the readability and understanding of Notebooks. Manual annotation of code cells is time-consuming and error-prone. Therefore, tools have been developed that classify the cells of a notebook concerning the ML activity performed in them. However, the current tools are not flexible, as they work based on look-up tables that have been created, which map function calls of commonly used ML libraries to ML activities. These tables must be manually adjusted to account for new or changed libraries.
This paper presents a more flexible approach to cell classification based on a hybrid classification approach that combines a rule-based and a decision tree classifier. We discuss the design rationales and describe the developed classifiers in detail. We implemented the new flexible cell classification approach in a tool called JupyLabel. Its evaluation and the obtained metric scores regarding precision, recall, and F1-score are discussed. Additionally, we compared JupyLabel with HeaderGen, an existing cell classification tool. We were able to show that the presented flexible cell classification approach outperforms this tool significantly.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots
Authors:
Pedro Beltran Lopez,
Pantaleone Nespoli,
Manuel Gil Perez
Abstract:
Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey…
▽ More
Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey server with the same characteristics as the victim asset, i.e., it is a clone. Such a mechanism ensures that the defender fools the attacker, thanks to stealth redirection. In this situation, the attacker will focus on attacking the honey server while enabling the recollection of relevant information to generate threat intelligence. The experiments in different scenarios show how the proposed solution can effectively redirect an attacker to a copied asset on demand, thus protecting the real asset. Finally, the results obtained by evaluating the latency times ensure that the redirection is undetectable by humans and very difficult to detect by a machine.
△ Less
Submitted 20 February, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
Acoustic Local Positioning With Encoded Emission Beacons
Authors:
Jesus Urena,
Alvaro Hernandez,
Juan Jesus Garcia,
Jose Manuel Villadangos,
Maria del Carmen Perez,
David Gualda,
Fernando J. Alvarez,
Teodoro Aguilera
Abstract:
Acoustic local positioning systems (ALPSs) are an interesting alternative for indoor positioning due to certain advantages over other approaches, including their relatively high accuracy, low cost, and room-level signal propagation. Centimeter-level or fine-grained indoor positioning can be an asset for robot navigation, guiding a person to, for instance, a particular piece in a museum or to a spe…
▽ More
Acoustic local positioning systems (ALPSs) are an interesting alternative for indoor positioning due to certain advantages over other approaches, including their relatively high accuracy, low cost, and room-level signal propagation. Centimeter-level or fine-grained indoor positioning can be an asset for robot navigation, guiding a person to, for instance, a particular piece in a museum or to a specific product in a shop, targeted advertising, or augmented reality. In airborne system applications, acoustic positioning can be based on using opportunistic signals or sounds produced by the person or object to be located (e.g., noise from appliances or the speech from a speaker) or from encoded emission beacons (or anchors) specifically designed for this purpose. This work presents a review of the different challenges that designers of systems based on encoded emission beacons must address in order to achieve suitable performance. At low-level processing, the waveform design (coding and modulation) and the processing of the received signal are key factors to address such drawbacks as multipath propagation, multiple-access interference, nearfar effect, or Doppler shifting. With regards to high-level system design, the issues to be addressed are related to the distribution of beacons, ease of deployment, and calibration and positioning algorithms, including the possible fusion of information. Apart from theoretical discussions, this work also includes the description of an ALPS that was implemented, installed in a large area and tested for mobile robot navigation. In addition to practical interest for real applications, airborne ALPSs can also be used as an excellent platform to test complex algorithms, which can be subsequently adapted for other positioning systems, such as underwater acoustic systems or ultrawideband radiofrequency (UWB RF) systems.
△ Less
Submitted 4 February, 2024;
originally announced February 2024.
-
A novel ANROA based control approach for grid-tied multi-functional solar energy conversion system
Authors:
Dinanath Prasad,
Narendra Kumar,
Rakhi Sharma,
Hasmat Malik,
Fausto Pedro García Márquez,
Jesús María Pinar Pérez
Abstract:
An adaptive control approach for a three-phase grid-interfaced solar photovoltaic system based on the new Neuro-Fuzzy Inference System with Rain Optimization Algorithm (ANROA) methodology is proposed and discussed in this manuscript. This method incorporates an Adaptive Neuro-fuzzy Inference System (ANFIS) with a Rain Optimization Algorithm (ROA). The ANFIS controller has excellent maximum trackin…
▽ More
An adaptive control approach for a three-phase grid-interfaced solar photovoltaic system based on the new Neuro-Fuzzy Inference System with Rain Optimization Algorithm (ANROA) methodology is proposed and discussed in this manuscript. This method incorporates an Adaptive Neuro-fuzzy Inference System (ANFIS) with a Rain Optimization Algorithm (ROA). The ANFIS controller has excellent maximum tracking capability because it includes features of both neural and fuzzy techniques. The ROA technique is in charge of controlling the voltage source converter switching. Avoiding power quality problems including voltage fluctuations, harmonics, and flickers as well as unbalanced loads and reactive power usage is the major goal. Besides, the proposed method performs at zero voltage regulation and unity power factor modes. The suggested control approach has been modeled and simulated, and its performance has been assessed using existing alternative methods. A statistical analysis of proposed and existing techniques has been also presented and discussed. The results of the simulations demonstrate that, when compared to alternative approaches, the suggested strategy may properly and effectively identify the best global solutions. Furthermore, the system's robustness has been studied by using MATLAB/SIMULINK environment and experimentally by Field Programmable Gate Arrays Controller (FPGA)-based Hardware-in-Loop (HLL).
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
A Big Data Architecture for Early Identification and Categorization of Dark Web Sites
Authors:
Javier Pastor-Galindo,
Hông-Ân Sandlin,
Félix Gómez Mármol,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
The dark web has become notorious for its association with illicit activities and there is a growing need for systems to automate the monitoring of this space. This paper proposes an end-to-end scalable architecture for the early identification of new Tor sites and the daily analysis of their content. The solution is built using an Open Source Big Data stack for data serving with Kubernetes, Kafka…
▽ More
The dark web has become notorious for its association with illicit activities and there is a growing need for systems to automate the monitoring of this space. This paper proposes an end-to-end scalable architecture for the early identification of new Tor sites and the daily analysis of their content. The solution is built using an Open Source Big Data stack for data serving with Kubernetes, Kafka, Kubeflow, and MinIO, continuously discovering onion addresses in different sources (threat intelligence, code repositories, web-Tor gateways, and Tor repositories), downloading the HTML from Tor and deduplicating the content using MinHash LSH, and categorizing with the BERTopic modeling (SBERT embedding, UMAP dimensionality reduction, HDBSCAN document clustering and c-TF-IDF topic keywords). In 93 days, the system identified 80,049 onion services and characterized 90% of them, addressing the challenge of Tor volatility. A disproportionate amount of repeated content is found, with only 6.1% unique sites. From the HTML files of the dark sites, 31 different low-topics are extracted, manually labeled, and grouped into 11 high-level topics. The five most popular included sexual and violent content, repositories, search engines, carding, cryptocurrencies, and marketplaces. During the experiments, we identified 14 sites with 13,946 clones that shared a suspiciously similar mirroring rate per day, suggesting an extensive common phishing network. Among the related works, this study is the most representative characterization of onion services based on topics to date.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Stable semivortex gap solitons in a spin-orbit-coupled Fermi gas
Authors:
Pablo Díaz,
Hugo Molinares,
Laura M. Pérez,
David Laroze,
Jean Bragard,
Boris A. Malomed
Abstract:
We demonstrate the existence of semivortex (SV) solitons, with vorticities $0$ and $1$ in the two components, in a two-dimensional (2D) fermionic spinor system under the action of the Rashba-type spin-orbit coupling in the combination with the Zeeman splitting (ZS). In the ``heavy-atom" approximation, which was previously elaborated for the bosonic system, the usual kinetic energy is neglected, wh…
▽ More
We demonstrate the existence of semivortex (SV) solitons, with vorticities $0$ and $1$ in the two components, in a two-dimensional (2D) fermionic spinor system under the action of the Rashba-type spin-orbit coupling in the combination with the Zeeman splitting (ZS). In the ``heavy-atom" approximation, which was previously elaborated for the bosonic system, the usual kinetic energy is neglected, which gives rise to a linear spectrum with a bandgap. The model includes the effective Pauli self-repulsion with power $7/3$, as produced by the density-functional theory of Fermi superfluids. In the general case, the inter-component contact repulsion is included too. We construct a family of gap solitons of the SV type populating the spectral bandgap. A stability region is identified for the SV solitons, by means of systematic simulations, in the parameter plane of the cross-repulsion strength and chemical potential. The stability region agrees with the prediction of the anti-Vakhitov-Kolokolov criterion, which is a relevant necessary stability condition for systems with self-repulsive nonlinearities. We also test the stability of the SV solitons against a sudden change of the ZS strength, which initiates robust oscillations in the spin state of the soliton due to transfer of particles between the system's components.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
A techno-economic model for avoiding conflicts of interest between owners of offshore wind farms and maintenance suppliers
Authors:
Alberto Pliego Marugán,
Fausto Pedro García Márquez,
Jesús María Pinar Pérez
Abstract:
Currently, wind energy is one of the most important sources of renewable energy. Offshore locations for wind turbines are increasingly exploited because of their numerous advantages. However, offshore wind farms require high investment in maintenance service. Due to its complexity and special requirements, maintenance service is usually outsourced by wind farm owners. In this paper, we propose a n…
▽ More
Currently, wind energy is one of the most important sources of renewable energy. Offshore locations for wind turbines are increasingly exploited because of their numerous advantages. However, offshore wind farms require high investment in maintenance service. Due to its complexity and special requirements, maintenance service is usually outsourced by wind farm owners. In this paper, we propose a novel approach to determine, quantify, and reduce the possible conflicts of interest between owners and maintenance suppliers. We created a complete techno-economic model to address this problem from an impartial point of view. An iterative process was developed to obtain statistical results that can help stakeholders negotiate the terms of the contract, in which the availability of the wind farm is the reference parameter by which to determine penalisations and incentives. Moreover, a multi-objective programming problem was addressed that maximises the profits of both parties without losing the alignment of their interests. The main scientific contribution of this paper is the maintenance analysis of offshore wind farms from two perspectives: that of the owner and the maintenance supplier. This analysis evaluates the conflicts of interest of both parties. In addition, we demonstrate that proper adjustment of some parameters, such as penalisation, incentives, and resources, and adequate control of availability can help reduce this conflict of interests.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
An approach to the moments subset sum problem through systems of diagonal equations over finite fields
Authors:
Juan Francisco Gottig,
Mariana Pérez,
Melina Privitelli
Abstract:
Let $\mathbb{F}_q$ be the finite field of $q$ elements, for a given subset $D\subset \mathbb{F}_q$, $m\in \mathbb{N}$, an integer $k\leq |D|$ and $\boldsymbol{b}\in \mathbb{F}_q^m$ we are interested in determining the existence of a subset $S\subset D$ of cardinality $k$ such that $\sum_{a\in S}a^i=b_i$ for $i=1,\ldots, m$. This problem is known as the moment subset sum problem and it is $NP$-comp…
▽ More
Let $\mathbb{F}_q$ be the finite field of $q$ elements, for a given subset $D\subset \mathbb{F}_q$, $m\in \mathbb{N}$, an integer $k\leq |D|$ and $\boldsymbol{b}\in \mathbb{F}_q^m$ we are interested in determining the existence of a subset $S\subset D$ of cardinality $k$ such that $\sum_{a\in S}a^i=b_i$ for $i=1,\ldots, m$. This problem is known as the moment subset sum problem and it is $NP$-complete for a general $D$. We make a novel approach of this problem trough algebraic geometry tools analyzing the underlying variety and employing combinatorial techniques to estimate the number of $\mathbb{F}_q$-rational points on certain varieties. We managed to give estimates on the number of $\mathbb{F}_q$-rational points on certain diagonal equations and use this results to give estimations and existence results for the subset sum problem.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Orbifolds and the modular curve
Authors:
Juan Martín Pérez,
Florent Schaffhauser
Abstract:
We provide an account of the construction of the moduli stack of elliptic curves as an analytic orbifold. While intimately linked to Thurston's point of view on the subject (discrete groups acting properly and effectively on differentiable manifolds), the construction of the modular orbi-curve and its universal family of elliptic curves ends up requiring a bit more technology, in order to allow fo…
▽ More
We provide an account of the construction of the moduli stack of elliptic curves as an analytic orbifold. While intimately linked to Thurston's point of view on the subject (discrete groups acting properly and effectively on differentiable manifolds), the construction of the modular orbi-curve and its universal family of elliptic curves ends up requiring a bit more technology, in order to allow for non-effective actions. The paper is entirely expository and makes no claims to originality: its main goal is to be self-contained enough in order to be useful to young researchers who are entering the field and are interested in the interactions between differential and algebraic geometry.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Kinematic Characterization of Micro-Mobility Vehicles During Evasive Maneuvers
Authors:
Paolo Terranova,
Shu-Yuan Liu,
Sparsh Jain,
Johan Engstrom,
Miguel Perez
Abstract:
There is an increasing need to comprehensively characterize the kinematic performances of different Micromobility Vehicles (MMVs). This study aims to: 1) characterize the kinematic behaviors of different MMVs during emergency maneuvers; 2) explore the influence of different MMV power sources on the device performances; 3) investigate if piecewise linear models are suitable for modeling MMV traject…
▽ More
There is an increasing need to comprehensively characterize the kinematic performances of different Micromobility Vehicles (MMVs). This study aims to: 1) characterize the kinematic behaviors of different MMVs during emergency maneuvers; 2) explore the influence of different MMV power sources on the device performances; 3) investigate if piecewise linear models are suitable for modeling MMV trajectories. A test track experiment where 40 frequent riders performed emergency braking and swerving maneuvers riding a subset of electric MMVs, their traditional counterparts, and, in some cases, behaving as running pedestrians. A second experiment was conducted to determine the MMVs swerving lower boundaries. Device power source resulted having a statistically significant influence on kinematic capabilities of the MMVs: while e-MMVs displayed superior braking capabilities compared to their traditional counterparts, the opposite was observed in terms of swerving performance. Furthermore, performances varied significantly across the different MMV typologies, with handlebar-based devices consistently outperforming the handlebar-less devices across the metrics considered. The piecewise linear models used for braking profiles fit well for most MMVs, except for skateboards and pedestrians due to foot-ground engagement. These findings underscore that the effectiveness of steering or braking in preventing collisions may vary depending on the type and power source of the device. This study also demonstrates the applicability of piecewise linear models for generating parameterized functions that accurately model braking trajectories, providing a valuable resource for automated systems developers. The model, however, also reveals that the single brake ramp assumption does not apply for certain types of MMVs or for pedestrians, indicating the necessity for further improvements.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Seq2seq for Automatic Paraphasia Detection in Aphasic Speech
Authors:
Matthew Perez,
Duc Le,
Amrit Romana,
Elise Jones,
Keli Licata,
Emily Mower Provost
Abstract:
Paraphasias are speech errors that are often characteristic of aphasia and they represent an important signal in assessing disease severity and subtype. Traditionally, clinicians manually identify paraphasias by transcribing and analyzing speech-language samples, which can be a time-consuming and burdensome process. Identifying paraphasias automatically can greatly help clinicians with the transcr…
▽ More
Paraphasias are speech errors that are often characteristic of aphasia and they represent an important signal in assessing disease severity and subtype. Traditionally, clinicians manually identify paraphasias by transcribing and analyzing speech-language samples, which can be a time-consuming and burdensome process. Identifying paraphasias automatically can greatly help clinicians with the transcription process and ultimately facilitate more efficient and consistent aphasia assessment. Previous research has demonstrated the feasibility of automatic paraphasia detection by training an automatic speech recognition (ASR) model to extract transcripts and then training a separate paraphasia detection model on a set of hand-engineered features. In this paper, we propose a novel, sequence-to-sequence (seq2seq) model that is trained end-to-end (E2E) to perform both ASR and paraphasia detection tasks. We show that the proposed model outperforms the previous state-of-the-art approach for both word-level and utterance-level paraphasia detection tasks and provide additional follow-up evaluations to further understand the proposed model behavior.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Assume-Guarantee Reinforcement Learning
Authors:
Milad Kazemi,
Mateo Perez,
Fabio Somenzi,
Sadegh Soudjani,
Ashutosh Trivedi,
Alvaro Velasquez
Abstract:
We present a modular approach to \emph{reinforcement learning} (RL) in environments consisting of simpler components evolving in parallel. A monolithic view of such modular environments may be prohibitively large to learn, or may require unrealizable communication between the components in the form of a centralized controller. Our proposed approach is based on the assume-guarantee paradigm where t…
▽ More
We present a modular approach to \emph{reinforcement learning} (RL) in environments consisting of simpler components evolving in parallel. A monolithic view of such modular environments may be prohibitively large to learn, or may require unrealizable communication between the components in the form of a centralized controller. Our proposed approach is based on the assume-guarantee paradigm where the optimal control for the individual components is synthesized in isolation by making \emph{assumptions} about the behaviors of neighboring components, and providing \emph{guarantees} about their own behavior. We express these \emph{assume-guarantee contracts} as regular languages and provide automatic translations to scalar rewards to be used in RL. By combining local probabilities of satisfaction for each component, we provide a lower bound on the probability of satisfaction of the complete system. By solving a Markov game for each component, RL can produce a controller for each component that maximizes this lower bound. The controller utilizes the information it receives through communication, observations, and any knowledge of a coarse model of other agents. We experimentally demonstrate the efficiency of the proposed approach on a variety of case studies.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Smooth symmetric systems over a finite field and applications
Authors:
Nardo Giménez,
Guillermo Matera,
Mariana Pérez,
Melina Privitelli
Abstract:
We study the set of common $\mathbb{F}_q$-rational solutions of "smooth" systems of multivariate symmetric polynomials with coefficients in a finite field $\mathbb{F}_q$. We show that, under certain conditions, the set of common solutions of such polynomial systems over the algebraic closure of $\mathbb{F}_q$ has a "good" geometric behavior. This allows us to obtain precise estimates on the corres…
▽ More
We study the set of common $\mathbb{F}_q$-rational solutions of "smooth" systems of multivariate symmetric polynomials with coefficients in a finite field $\mathbb{F}_q$. We show that, under certain conditions, the set of common solutions of such polynomial systems over the algebraic closure of $\mathbb{F}_q$ has a "good" geometric behavior. This allows us to obtain precise estimates on the corresponding number of common $\mathbb{F}_q$-rational solutions. In the case of hypersurfaces we are able to improve the results. We illustrate the interest of these estimates through their application to certain classical combinatorial problems over finite fields.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
The Twisted Gradient Flow strong coupling with Parallel Tempering on Boundary Conditions
Authors:
Claudio Bonanno,
Jorge Luis Dasilva Golán,
Massimo D'Elia,
Margarita García Pérez,
Andrea Giorgieri
Abstract:
We present a proposal for calculating the running of the coupling constant of the $\mathrm{SU}(3)$ pure-gauge theory, which combines the Twisted Gradient Flow (TGF) renormalization scheme with Parallel Tempering on Boundary Conditions (PTBC). The TGF is a gradient flow-based renormalization scheme formulated in an asymmetric lattice with twisted boundary conditions. Combined with step scaling, it…
▽ More
We present a proposal for calculating the running of the coupling constant of the $\mathrm{SU}(3)$ pure-gauge theory, which combines the Twisted Gradient Flow (TGF) renormalization scheme with Parallel Tempering on Boundary Conditions (PTBC). The TGF is a gradient flow-based renormalization scheme formulated in an asymmetric lattice with twisted boundary conditions. Combined with step scaling, it has been successfully used to calculate the $\mathrm{SU}(3)$ $Λ$ parameter. As with all gradient flow-based schemes, the coupling constant is highly correlated with the topological charge and affected by topology freezing, an issue addressed by projecting the determination of the coupling onto the zero topological sector. As an alternative to the zero-charge projection, we combine TGF with PTBC, by replicating multiple copies of the same lattice, interpolating between periodic and open boundary conditions in a parallel-tempered manner. We present a first exploration of these ideas by analyzing specific ensembles of $\mathrm{SU}(3)$ lattices with and without PTBC.
△ Less
Submitted 15 December, 2023; v1 submitted 14 December, 2023;
originally announced December 2023.
-
Omega-Regular Decision Processes
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Regular decision processes (RDPs) are a subclass of non-Markovian decision processes where the transition and reward functions are guarded by some regular property of the past (a lookback). While RDPs enable intuitive and succinct representation of non-Markovian decision processes, their expressive power coincides with finite-state Markov decision processes (MDPs). We introduce omega-regular decis…
▽ More
Regular decision processes (RDPs) are a subclass of non-Markovian decision processes where the transition and reward functions are guarded by some regular property of the past (a lookback). While RDPs enable intuitive and succinct representation of non-Markovian decision processes, their expressive power coincides with finite-state Markov decision processes (MDPs). We introduce omega-regular decision processes (ODPs) where the non-Markovian aspect of the transition and reward functions are extended to an omega-regular lookahead over the system evolution. Semantically, these lookaheads can be considered as promises made by the decision maker or the learning agent about her future behavior. In particular, we assume that, if the promised lookaheads are not met, then the payoff to the decision maker is $\bot$ (least desirable payoff), overriding any rewards collected by the decision maker. We enable optimization and learning for ODPs under the discounted-reward objective by reducing them to lexicographic optimization and learning over finite MDPs. We present experimental results demonstrating the effectiveness of the proposed reduction.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
Flavon vacuum alignment beyond SUSY
Authors:
Claudia Hagedorn,
M. L. López-Ibáñez,
M. Jay Pérez,
Moinul Hossain Rahat,
Oscar Vives
Abstract:
In flavor models the vacuum alignment of flavons is typically achieved via the $F$-terms of certain fields in the supersymmetric limit. We propose a method for preserving such alignments, up to a rescaling of the vacuum expectation values, even after supersymmetry (and the flavor symmetry) are softly broken, facilitating the vacuum alignment in models which are non-supersymmetric at low energies.…
▽ More
In flavor models the vacuum alignment of flavons is typically achieved via the $F$-terms of certain fields in the supersymmetric limit. We propose a method for preserving such alignments, up to a rescaling of the vacuum expectation values, even after supersymmetry (and the flavor symmetry) are softly broken, facilitating the vacuum alignment in models which are non-supersymmetric at low energies. Examples of models with different flavor groups, namely $A_4$, $T_7$, $S_4$ and $Δ(27)$, are discussed.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Modeling Global Levelized Cost of Hydrogen Production Considering Country-Specific Investment Risks
Authors:
Stephan Kigle,
Tapio Schmidt-Achert,
Miguel Ángel Martínez Pérez
Abstract:
Hydrogen is central to the global energy transition when produced at low emissions. This paper introduces a renewable hydrogen production system model (HPSM) that optimizes a hybrid hydrogen production system (HPS) on a worldwide 50x50 km grid, considering country-specific interest rates. Besides the renewable energy's impact on the HPS design, we analyze the effect of country-specific interest ra…
▽ More
Hydrogen is central to the global energy transition when produced at low emissions. This paper introduces a renewable hydrogen production system model (HPSM) that optimizes a hybrid hydrogen production system (HPS) on a worldwide 50x50 km grid, considering country-specific interest rates. Besides the renewable energy's impact on the HPS design, we analyze the effect of country-specific interest rates on the levelized cost of hydrogen (LCOH) production. LCOH production ranges between 2.7 Euro/kg and 28.4 Euro/kg, with an average of 9.1 Euro/kg. Over one third (40.0%) of all cells have an installed PV capacity share between 50% and 70%, and 76.4% have a hybrid configuration. Hybrid HPSs can significantly reduce the LCOH production compared to non-hybrid designs, whereas country-specific interest rates lead to significant increases in the LCOH production. Hydrogen storage is deployed rather than battery storage to balance production and demand.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Experimentation on stochastic trajectories: from Brownian motion to inertial confined dynamics
Authors:
Azul María Brigante,
Corina Révora,
Gabriel Fernando Volonnino,
Marcos Damián Perez,
Gabriela Pasquini,
María Gabriela Capeluto
Abstract:
Statistical physics courses typically employ abstract language that describes objects too small to be seen, making the topic challenging for students to understand. In this work, we introduce a simple experiment that allows conceptualizing some of the underlying ideas of stochastic processes through direct experimentation. Students analyze stochastic trajectories of beads in a bouncing bed of smal…
▽ More
Statistical physics courses typically employ abstract language that describes objects too small to be seen, making the topic challenging for students to understand. In this work, we introduce a simple experiment that allows conceptualizing some of the underlying ideas of stochastic processes through direct experimentation. Students analyze stochastic trajectories of beads in a bouncing bed of smaller beads subjected to an external periodic drive. The analysis of the trajectories involves the application of a vast tool kit of statistical estimators that are useful in many fields of physics.
△ Less
Submitted 2 December, 2023;
originally announced December 2023.
-
The distribution amplitude of the $η_c$ meson
Authors:
Miguel Teseo San José Pérez,
Benoît Blossier,
Mariane Mangin-Brinet,
José Manuel Morgado Chávez
Abstract:
We report on the first lattice determination of the pseudoscalar meson $η_c$ light-cone distribution amplitude, using a set of three CLS $N_f=2$ ensembles at a pion mass $m_π \sim 270~\text{MeV}$ and lattice spacings $a \sim 0.076~\text{fm}$, $0.066~\text{fm}$ and $0.049~\text{fm}$. Employing Short Distance Factorization, we extract the pseudo-DA on the lattice for Ioffe times $ν\leq 4.5$, and the…
▽ More
We report on the first lattice determination of the pseudoscalar meson $η_c$ light-cone distribution amplitude, using a set of three CLS $N_f=2$ ensembles at a pion mass $m_π \sim 270~\text{MeV}$ and lattice spacings $a \sim 0.076~\text{fm}$, $0.066~\text{fm}$ and $0.049~\text{fm}$. Employing Short Distance Factorization, we extract the pseudo-DA on the lattice for Ioffe times $ν\leq 4.5$, and the various lattice spacings allow us to take the continuum limit. We employ a basis of Jacobi polynomials to parametrize the distribution amplitude, which allows to express the matching to the pseudo distribution in closed form, and we observe a strong effect which we attribute to the heavy charm-quark mass.
△ Less
Submitted 20 November, 2023; v1 submitted 16 November, 2023;
originally announced November 2023.
-
Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces
Authors:
Eduardo López Bernal,
Sergio López Bernal,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct communication between the brain and computers. Specifically, electroencephalography (EEG) is one of the most common techniques for obtaining evoked potentials resulting from external stimuli, as the P300 potential is elicited from known images. The combination of Machine Learning (ML) and P300 potentials is…
▽ More
Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct communication between the brain and computers. Specifically, electroencephalography (EEG) is one of the most common techniques for obtaining evoked potentials resulting from external stimuli, as the P300 potential is elicited from known images. The combination of Machine Learning (ML) and P300 potentials is promising for authenticating subjects since the brain waves generated by each person when facing a particular stimulus are unique. However, existing authentication solutions do not extensively explore P300 potentials and fail when analyzing the most suitable processing and ML-based classification techniques. Thus, this work proposes i) a framework for authenticating BCI users using the P300 potential; ii) the validation of the framework on ten subjects creating an experimental scenario employing a non-invasive EEG-based BCI; and iii) the evaluation of the framework performance defining two experiments (binary and multiclass ML classification) and three testing configurations incrementally analyzing the performance of different processing techniques and the differences between classifying with epochs or statistical values. This framework achieved a performance close to 100\% f1-score in both experiments for the best classifier, highlighting its effectiveness in accurately authenticating users and demonstrating the feasibility of performing EEG-based authentication using P300 potentials.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
The chiral condensate at large $N$
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Peréz,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We present results for the large-$N$ limit of the chiral condensate computed from twisted reduced models. We followed a two-fold strategy, one constiting in extracting the condensate from the quark-mass dependence of the pion mass, the other consisting in extracting the condensate from the mode number of the Dirac operator.
We present results for the large-$N$ limit of the chiral condensate computed from twisted reduced models. We followed a two-fold strategy, one constiting in extracting the condensate from the quark-mass dependence of the pion mass, the other consisting in extracting the condensate from the mode number of the Dirac operator.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
A PAC Learning Algorithm for LTL and Omega-regular Objectives in MDPs
Authors:
Mateo Perez,
Fabio Somenzi,
Ashutosh Trivedi
Abstract:
Linear temporal logic (LTL) and omega-regular objectives -- a superset of LTL -- have seen recent use as a way to express non-Markovian objectives in reinforcement learning. We introduce a model-based probably approximately correct (PAC) learning algorithm for omega-regular objectives in Markov decision processes (MDPs). As part of the development of our algorithm, we introduce the epsilon-recurre…
▽ More
Linear temporal logic (LTL) and omega-regular objectives -- a superset of LTL -- have seen recent use as a way to express non-Markovian objectives in reinforcement learning. We introduce a model-based probably approximately correct (PAC) learning algorithm for omega-regular objectives in Markov decision processes (MDPs). As part of the development of our algorithm, we introduce the epsilon-recurrence time: a measure of the speed at which a policy converges to the satisfaction of the omega-regular objective in the limit. We prove that our algorithm only requires a polynomial number of samples in the relevant parameters, and perform experiments which confirm our theory.
△ Less
Submitted 20 February, 2024; v1 submitted 18 October, 2023;
originally announced October 2023.
-
Simulating high-pressure surface reactions with molecular beams
Authors:
Amjad Al Taleb,
Frederik Schiller,
Denis V. Vyalikh,
José Maria Pérez,
Sabine V. Auras,
Daniel Farías,
J. Enrique Ortega
Abstract:
Using a reactive molecular beam with high kinetic energy ($E_{kin}$) it is possible to speed gas-surface reactions involving high activation barriers ($E_{act}$), which would require elevated pressures ($P_0$) if a random gas with a Maxwell-Boltzmann distribution is used. By simply computing the number of molecules that overcome the activation barrier in a random gas at $P_0$ and in a molecular be…
▽ More
Using a reactive molecular beam with high kinetic energy ($E_{kin}$) it is possible to speed gas-surface reactions involving high activation barriers ($E_{act}$), which would require elevated pressures ($P_0$) if a random gas with a Maxwell-Boltzmann distribution is used. By simply computing the number of molecules that overcome the activation barrier in a random gas at $P_0$ and in a molecular beam at $E_{kin}$=$E_{act}$, we establish an $E_{kin}$-$P_0$ equivalence curve, through which we postulate that molecular beams are ideal tools to investigate gas-surface reactions that involve high activation energies. In particular, we foresee the use of molecular beams to simulate gas surface reactions within the industrial-range ($>$ 10 bar) using surface-sensitive Ultra-High Vacuum (UHV) techniques, such as X-ray photoemission spectroscopy (XPS). To test this idea, we revisit the oxidation of the Cu(111) surface combining O$_2$ molecular beams and XPS experiments. By tuning the kinetic energy of the O$_2$ beam in the range 0.24-1 eV we achieve the same sequence of surface oxides obtained in Ambient Pressure Photoemission (AP-XPS) experiments, in which the Cu(111) surface was exposed to a random O$_2$ gas up to 1 mbar. We observe the same surface oxidation kinetics as in the random gas, but with a much lower dose, close to the expected value derived from the equivalence curve.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
The large-$N$ limit of the chiral condensate from twisted reduced models
Authors:
Claudio Bonanno,
Pietro Butti,
Margarita García Peréz,
Antonio González-Arroyo,
Ken-Ichi Ishikawa,
Masanori Okawa
Abstract:
We compute the large-$N$ limit of the QCD chiral condensate on the lattice using twisted reduced models, and performing controlled continuum and chiral extrapolations. We perform two different calculations: one consists in extracting the chiral condensate from the quark mass dependence of the pion mass, and the other consists in extracting the chiral condensate from the behaviour of the mode numbe…
▽ More
We compute the large-$N$ limit of the QCD chiral condensate on the lattice using twisted reduced models, and performing controlled continuum and chiral extrapolations. We perform two different calculations: one consists in extracting the chiral condensate from the quark mass dependence of the pion mass, and the other consists in extracting the chiral condensate from the behaviour of the mode number of the Wilson-Dirac operator for small eigenvalues. We find consistency between the results of the two methods, giving a joint estimate of $\lim_{N\to\infty}Σ(N)/N=[184(13)$ MeV$]^3$ ($\overline{\mathrm{MS}}$, $μ=2$ GeV, taking the square root of the string tension $\sqrtσ=440$ MeV to set the scale), in remarkable agreement with the $\mathrm{SU}(3)$ 2-flavor FLAG result.
△ Less
Submitted 4 December, 2023; v1 submitted 27 September, 2023;
originally announced September 2023.
-
On the $Σ$-invariants of Artin groups satisfying the $K(π,1)$-conjecture
Authors:
Marcos Escartín Ferrer,
Conchita Martínez Pérez
Abstract:
We consider $Σ$-invariants of Artin groups that satisfy the $K(π,1)$-conjecture. These invariants determine the cohomological finiteness conditions of subgroups that contain the derived subgroup. We extend a known result for even Artin groups of FC-type, giving a sufficient condition for a character $χ:A_Γ\to\mathbb{R}$ to belong to $Σ^n(A_Γ,\mathbb{Z})$. We also prove some partial converses. As a…
▽ More
We consider $Σ$-invariants of Artin groups that satisfy the $K(π,1)$-conjecture. These invariants determine the cohomological finiteness conditions of subgroups that contain the derived subgroup. We extend a known result for even Artin groups of FC-type, giving a sufficient condition for a character $χ:A_Γ\to\mathbb{R}$ to belong to $Σ^n(A_Γ,\mathbb{Z})$. We also prove some partial converses. As applications, we prove that the $Σ^1$-conjecture holds true when there is a prime $p$ that divides $l(e)/2$ for any edge with even label $l(e)>2$, we generalize to Artin groups the homological version of Bestvina-Brady theorem and we compute the $Σ$-invariants of all irreducible spherical and affine Artin groups and triangle Artin groups, which provide a complete classification of the $F_n$ and $FP_n$ properties of their derived subgroup.
△ Less
Submitted 11 December, 2023; v1 submitted 6 September, 2023;
originally announced September 2023.
-
Omega-Regular Reward Machines
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Reinforcement learning (RL) is a powerful approach for training agents to perform tasks, but designing an appropriate reward mechanism is critical to its success. However, in many cases, the complexity of the learning objectives goes beyond the capabilities of the Markovian assumption, necessitating a more sophisticated reward mechanism. Reward machines and omega-regular languages are two formalis…
▽ More
Reinforcement learning (RL) is a powerful approach for training agents to perform tasks, but designing an appropriate reward mechanism is critical to its success. However, in many cases, the complexity of the learning objectives goes beyond the capabilities of the Markovian assumption, necessitating a more sophisticated reward mechanism. Reward machines and omega-regular languages are two formalisms used to express non-Markovian rewards for quantitative and qualitative objectives, respectively. This paper introduces omega-regular reward machines, which integrate reward machines with omega-regular languages to enable an expressive and effective reward mechanism for RL. We present a model-free RL algorithm to compute epsilon-optimal strategies against omega-egular reward machines and evaluate the effectiveness of the proposed algorithm through experiments.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation
Authors:
Chao Feng,
Alberto Huertas Celdran,
Pedro Miguel Sanchez Sanchez,
Jan Kreischer,
Jan von der Assen,
Gerome Bovet,
Gregorio Martinez Perez,
Burkhard Stiller
Abstract:
Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains…
▽ More
Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective against a rising number of heterogeneous zero-day attacks. Thus, this work presents CyberForce, a framework that combines Federated and Reinforcement Learning (FRL) to collaboratively and privately learn suitable MTD techniques for mitigating zero-day attacks. CyberForce integrates device fingerprinting and anomaly detection to reward or penalize MTD mechanisms chosen by an FRL-based agent. The framework has been deployed and evaluated in a scenario consisting of ten physical devices of a real IoT platform affected by heterogeneous malware samples. A pool of experiments has demonstrated that CyberForce learns the MTD technique mitigating each attack faster than existing RL-based centralized approaches. In addition, when various devices are exposed to different attacks, CyberForce benefits from knowledge transfer, leading to enhanced performance and reduced learning time in comparison to recent works. Finally, different aggregation algorithms used during the agent learning process provide CyberForce with notable robustness to malicious attacks.
△ Less
Submitted 8 September, 2023; v1 submitted 11 August, 2023;
originally announced August 2023.
-
Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense
Authors:
Enrique Tomás Martínez Beltrán,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent…
▽ More
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decentralized nature of the aggregation process, the varied roles and responsibilities of the participants, and the absence of a central authority to oversee and mitigate threats. Addressing these challenges, this paper first delineates a comprehensive threat model focused on DFL communications. In response to these identified risks, this work introduces a security module to counter communication-based attacks for DFL platforms. The module combines security techniques such as symmetric and asymmetric encryption with Moving Target Defense (MTD) techniques, including random neighbor selection and IP/port switching. The security module is implemented in a DFL platform, Fedstellar, allowing the deployment and monitoring of the federation. A DFL scenario with physical and virtual deployments have been executed, encompassing three security configurations: (i) a baseline without security, (ii) an encrypted configuration, and (iii) a configuration integrating both encryption and MTD techniques. The effectiveness of the security module is validated through experiments with the MNIST dataset and eclipse attacks. The results showed an average F1 score of 95%, with the most secure configuration resulting in CPU usage peaking at 68% (+-9%) in virtual deployments and network traffic reaching 480.8 MB (+-18 MB), effectively mitigating risks associated with eavesdrop** or eclipse attacks.
△ Less
Submitted 9 December, 2023; v1 submitted 21 July, 2023;
originally announced July 2023.
-
Challenges and Opportunities for RISC-V Architectures towards Genomics-based Workloads
Authors:
Gonzalo Gomez-Sanchez,
Aaron Call,
Xavier Teruel,
Lorena Alonso,
Ignasi Moran,
Miguel Angel Perez,
David Torrents,
Josep Ll. Berral
Abstract:
The use of large-scale supercomputing architectures is a hard requirement for scientific computing Big-Data applications. An example is genomics analytics, where millions of data transformations and tests per patient need to be done to find relevant clinical indicators. Therefore, to ensure open and broad access to high-performance technologies, governments, and academia are pushing toward the int…
▽ More
The use of large-scale supercomputing architectures is a hard requirement for scientific computing Big-Data applications. An example is genomics analytics, where millions of data transformations and tests per patient need to be done to find relevant clinical indicators. Therefore, to ensure open and broad access to high-performance technologies, governments, and academia are pushing toward the introduction of novel computing architectures in large-scale scientific environments. This is the case of RISC-V, an open-source and royalty-free instruction-set architecture. To evaluate such technologies, here we present the Variant-Interaction Analytics use case benchmarking suite and datasets. Through this use case, we search for possible genetic interactions using computational and statistical methods, providing a representative case for heavy ETL (Extract, Transform, Load) data processing. Current implementations are implemented in x86-based supercomputers (e.g. MareNostrum-IV at the Barcelona Supercomputing Center (BSC)), and future steps propose RISC-V as part of the next MareNostrum generations. Here we describe the Variant Interaction Use Case, highlighting the characteristics leveraging high-performance computing, indicating the caveats and challenges towards the next RISC-V developments and designs to come from a first comparison between x86 and RISC-V architectures on real Variant Interaction executions over real hardware implementations.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
RansomAI: AI-powered Ransomware for Stealthy Encryption
Authors:
Jan von der Assen,
Alberto Huertas Celdrán,
Janik Luechinger,
Pedro Miguel Sánchez Sánchez,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef…
▽ More
Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in ineffective and obsolete cybersecurity solutions, but the literature lacks AI-powered ransomware to verify it. Thus, this work proposes RansomAI, a Reinforcement Learning-based framework that can be integrated into existing ransomware samples to adapt their encryption behavior and stay stealthy while encrypting files. RansomAI presents an agent that learns the best encryption algorithm, rate, and duration that minimizes its detection (using a reward mechanism and a fingerprinting intelligent detection system) while maximizing its damage function. The proposed framework was validated in a ransomware, Ransomware-PoC, that infected a Raspberry Pi 4, acting as a crowdsensor. A pool of experiments with Deep Q-Learning and Isolation Forest (deployed on the agent and detection system, respectively) has demonstrated that RansomAI evades the detection of Ransomware-PoC affecting the Raspberry Pi 4 in a few minutes with >90% accuracy.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Fedstellar: A Platform for Decentralized Federated Learning
Authors:
Enrique Tomás Martínez Beltrán,
Ángel Luis Perales Gómez,
Chao Feng,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin…
▽ More
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, single point of failure, and reliance on a central server. Decentralized Federated Learning (DFL) addresses these issues by enabling decentralized model aggregation and minimizing dependency on a central entity. Despite these advances, current platforms training DFL models struggle with key issues such as managing heterogeneous federation network topologies. To overcome these challenges, this paper presents Fedstellar, a platform extended from p2pfl library and designed to train FL models in a decentralized, semi-decentralized, and centralized fashion across diverse federations of physical or virtualized devices. The Fedstellar implementation encompasses a web application with an interactive graphical interface, a controller for deploying federations of nodes using physical or virtual devices, and a core deployed on each device which provides the logic needed to train, aggregate, and communicate in the network. The effectiveness of the platform has been demonstrated in two scenarios: a physical deployment involving single-board devices such as Raspberry Pis for detecting cyberattacks, and a virtualized deployment comparing various FL approaches in a controlled environment using MNIST and CIFAR-10 datasets. In both scenarios, Fedstellar demonstrated consistent performance and adaptability, achieving F1 scores of 91%, 98%, and 91.2% using DFL for detecting cyberattacks and classifying MNIST and CIFAR-10, respectively, reducing training time by 32% compared to centralized approaches.
△ Less
Submitted 8 April, 2024; v1 submitted 16 June, 2023;
originally announced June 2023.
-
Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerab…
▽ More
The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerable to attacks or can be easily duplicated, posing challenges to securing crowdsensing applications. Besides, current solutions leveraging device behavior are mostly focused on device identification, which is a simpler task than authentication. To address these issues, an individual IoT device authentication framework based on hardware behavior fingerprinting and Transformer autoencoders is proposed in this work. This solution leverages the inherent imperfections and variations in IoT device hardware to differentiate between devices with identical specifications. By monitoring and analyzing the behavior of key hardware components, such as the CPU, GPU, RAM, and Storage on devices, unique fingerprints for each device are created. The performance samples are considered as time series data and used to train outlier detection transformer models, one per device and aiming to model its normal data distribution. Then, the framework is validated within a spectrum crowdsensing system leveraging Raspberry Pi devices. After a pool of experiments, the model from each device is able to individually authenticate it between the 45 devices employed for validation. An average True Positive Rate (TPR) of 0.74+-0.13 and an average maximum False Positive Rate (FPR) of 0.06+-0.09 demonstrate the effectiveness of this approach in enhancing authentication, security, and trust in crowdsensing applications.
△ Less
Submitted 11 November, 2023; v1 submitted 14 June, 2023;
originally announced June 2023.
-
Policy Synthesis and Reinforcement Learning for Discounted LTL
Authors:
Rajeev Alur,
Osbert Bastani,
Kishor Jothimurugan,
Mateo Perez,
Fabio Somenzi,
Ashutosh Trivedi
Abstract:
The difficulty of manually specifying reward functions has led to an interest in using linear temporal logic (LTL) to express objectives for reinforcement learning (RL). However, LTL has the downside that it is sensitive to small perturbations in the transition probabilities, which prevents probably approximately correct (PAC) learning without additional assumptions. Time discounting provides a wa…
▽ More
The difficulty of manually specifying reward functions has led to an interest in using linear temporal logic (LTL) to express objectives for reinforcement learning (RL). However, LTL has the downside that it is sensitive to small perturbations in the transition probabilities, which prevents probably approximately correct (PAC) learning without additional assumptions. Time discounting provides a way of removing this sensitivity, while retaining the high expressivity of the logic. We study the use of discounted LTL for policy synthesis in Markov decision processes with unknown transition probabilities, and show how to reduce discounted LTL to discounted-sum reward via a reward machine when all discount factors are identical.
△ Less
Submitted 29 May, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Wittgenstein on decisions and the mathematical practice
Authors:
M. Muñoz Pérez
Abstract:
Putnam and Finkelstein can be read as providing an answer to Kripke's skeptical argument by appealing to the way mathematics is commonly pursued. Nowadays, the debate surrounding pluralism has questioned the postulation of a unique way of develo** mathematical activity. In this paper, we wish to reformulate Kripke's argument as a challenge for the conjunction of 'ifthenism' and a reasonable form…
▽ More
Putnam and Finkelstein can be read as providing an answer to Kripke's skeptical argument by appealing to the way mathematics is commonly pursued. Nowadays, the debate surrounding pluralism has questioned the postulation of a unique way of develo** mathematical activity. In this paper, we wish to reformulate Kripke's argument as a challenge for the conjunction of 'ifthenism' and a reasonable form of pluralism (which we have called '$V$-pluralism') and, at the same time, propose a reading of some passages of the 'Philosophical Investigations' as a solution. Our conclusion is that, in order for pluralism to be preserved, we need to clarify both the fact that we make definite 'decisions' and the philosophical value that they, as we argue, bear. To investigate the nature of this value is one of the further tasks want to cover in this article.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Total orders realizable as the distances between two sets of points
Authors:
Gerardo L. Maldonado,
Miguel Raggi Pérez,
Edgardo Roldán-Pensado
Abstract:
In this note we give a negative answer to a question proposed by Almendra-Hernández and Martínez-Sandoval. Let $n\le m$ be positive integers and let $X$ and $Y$ be sets of sizes $n$ and $m$ in $\mathbb R^{n-1}$ such that $X\cup Y$ is in generic position. There is a natural order on $X\times Y$ induced by the distances between the corresponding points. The question is if all possible orders on…
▽ More
In this note we give a negative answer to a question proposed by Almendra-Hernández and Martínez-Sandoval. Let $n\le m$ be positive integers and let $X$ and $Y$ be sets of sizes $n$ and $m$ in $\mathbb R^{n-1}$ such that $X\cup Y$ is in generic position. There is a natural order on $X\times Y$ induced by the distances between the corresponding points. The question is if all possible orders on $X\times Y$ can be obtained in this way. We show that the answer is negative when $n<m$. The case $n=m$ remains open.
△ Less
Submitted 6 May, 2024; v1 submitted 11 April, 2023;
originally announced April 2023.
-
Ultra-low radioactivity flexible printed cables
Authors:
Isaac J. Arnquist,
Maria Laura di Vacri,
Nicole Rocco,
Richard Saldanha,
Tyler Schlieder,
Raj Patel,
Jay Patil,
Mario Perez,
Harshad Uka
Abstract:
Flexible printed cables and circuitry based on copper-polyimide materials are widely used in experiments looking for rare events due to their unique electrical and mechanical characteristics. However, past studies have found copper-polyimide flexible cables to contain 400-4700 pg $^{238}$U/g, 16-3700 pg $^{232}$Th/g, and 170-2100 ng $^{nat}$K/g, which can be a significant source of radioactive bac…
▽ More
Flexible printed cables and circuitry based on copper-polyimide materials are widely used in experiments looking for rare events due to their unique electrical and mechanical characteristics. However, past studies have found copper-polyimide flexible cables to contain 400-4700 pg $^{238}$U/g, 16-3700 pg $^{232}$Th/g, and 170-2100 ng $^{nat}$K/g, which can be a significant source of radioactive background for many current and next-generation ultralow background detectors. This study presents a comprehensive investigation into the fabrication process of copper-polyimide flexible cables and the development of custom low radioactivity cables for use in rare-event physics applications. A methodical step-by-step approach was developed and informed by ultrasensitive assay to determine the radiopurity in the starting materials and identify the contaminating production steps in the cable fabrication process. Radiopure material alternatives were identified, and cleaner production processes and treatments were developed to significantly reduce the imparted contamination. Through the newly developed radiopure fabrication process, fully-functioning cables were produced with radiocontaminant concentrations of 20-31 pg $^{238}$U/g, 12-13 pg $^{232}$Th/g, and 40-550 ng $^{nat}$K/g, which is significantly cleaner than cables from previous work and sufficiently radiopure for current and next-generation detectors. This approach, employing witness samples to investigate each step of the fabrication process, can hopefully serve as a template for investigating radiocontaminants in other material production processes.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
DLT: Conditioned layout generation with Joint Discrete-Continuous Diffusion Layout Transformer
Authors:
Elad Levi,
Eli Brosh,
Mykola Mykhailych,
Meir Perez
Abstract:
Generating visual layouts is an essential ingredient of graphic design. The ability to condition layout generation on a partial subset of component attributes is critical to real-world applications that involve user interaction. Recently, diffusion models have demonstrated high-quality generative performances in various domains. However, it is unclear how to apply diffusion models to the natural r…
▽ More
Generating visual layouts is an essential ingredient of graphic design. The ability to condition layout generation on a partial subset of component attributes is critical to real-world applications that involve user interaction. Recently, diffusion models have demonstrated high-quality generative performances in various domains. However, it is unclear how to apply diffusion models to the natural representation of layouts which consists of a mix of discrete (class) and continuous (location, size) attributes. To address the conditioning layout generation problem, we introduce DLT, a joint discrete-continuous diffusion model. DLT is a transformer-based model which has a flexible conditioning mechanism that allows for conditioning on any given subset of all the layout component classes, locations, and sizes. Our method outperforms state-of-the-art generative models on various layout generation datasets with respect to different metrics and conditioning settings. Additionally, we validate the effectiveness of our proposed conditioning mechanism and the joint continuous-diffusion process. This joint process can be incorporated into a wide range of mixed discrete-continuous generative tasks.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.